2010-01-14 15:26:35 +01:00
|
|
|
{ stdenv, fetchurl, unzip, ruby, openssl, makeWrapper }:
|
2010-01-13 15:25:45 +01:00
|
|
|
|
|
|
|
stdenv.mkDerivation {
|
2011-10-21 18:25:27 +02:00
|
|
|
name = "ec2-ami-tools-1.4.0.1";
|
2010-01-14 15:26:35 +01:00
|
|
|
|
2010-07-13 22:58:58 +02:00
|
|
|
buildInputs = [ unzip makeWrapper ];
|
2010-01-14 15:26:35 +01:00
|
|
|
|
2010-01-13 15:25:45 +01:00
|
|
|
src = fetchurl {
|
|
|
|
url = http://s3.amazonaws.com/ec2-downloads/ec2-ami-tools.zip;
|
2011-10-21 18:25:27 +02:00
|
|
|
sha256 = "1fjg3gx5k0z8r4apg5whz3yxc3xnz7z5g6j93hf765lfriz1rccz";
|
2010-01-13 15:25:45 +01:00
|
|
|
};
|
|
|
|
|
2010-01-22 17:42:54 +01:00
|
|
|
# Amazon EC2 requires that disk images are writable. If they're
|
|
|
|
# not, the VM immediately terminates with a mysterious
|
|
|
|
# "Server.InternalError" message. Since disk images generated in
|
|
|
|
# the Nix store are read-only, they must be made writable in the
|
|
|
|
# tarball uploaded to Amazon S3. So add a `--mode=0755' flag to the
|
|
|
|
# tar invocation.
|
|
|
|
patches = [ ./writable.patch ];
|
|
|
|
|
2010-01-13 15:25:45 +01:00
|
|
|
installPhase =
|
|
|
|
''
|
|
|
|
ensureDir $out
|
|
|
|
mv * $out
|
|
|
|
rm $out/*.txt
|
|
|
|
|
|
|
|
for i in $out/bin/*; do
|
|
|
|
wrapProgram $i \
|
|
|
|
--set EC2_HOME $out \
|
2010-01-14 15:26:35 +01:00
|
|
|
--prefix PATH : ${ruby}/bin:${openssl}/bin
|
2010-01-13 15:25:45 +01:00
|
|
|
done
|
|
|
|
|
2010-01-14 15:26:35 +01:00
|
|
|
sed -i 's|/bin/bash|${stdenv.shell}|' $out/lib/ec2/platform/base/pipeline.rb
|
2011-10-21 18:25:27 +02:00
|
|
|
''; # */
|
2010-01-13 15:25:45 +01:00
|
|
|
|
|
|
|
meta = {
|
|
|
|
homepage = http://developer.amazonwebservices.com/connect/entry.jspa?externalID=368&categoryID=88;
|
|
|
|
description = "Command-line tools to create and manage Amazon EC2 virtual machine images";
|
|
|
|
license = "unfree-redistributable";
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|